Game-Theoretic Analysis of MEV Attacks and Mitigation Strategies in Decentralized Finance
Abstract
1. Introduction
- How can the strategic interactions among searchers, builders, and validators in the MEV supply chain be formally modeled as a multi-stage game of incomplete information?
- What are the Perfect Bayesian Nash Equilibrium (PBNE) strategies for participants in this game, and what do they reveal about market efficiency and actor profitability?
- To what extent do these competitive dynamics harm social welfare, and how can this loss be quantified using on-chain data?
- How effective are proposed mechanism design solutions, such as commit–reveal schemes, at altering these strategic equilibria to mitigate harmful MEV?
- A formal three-stage game-theoretic model of MEV extraction is developed that captures the strategic interactions between searchers, builders, and validators under conditions of incomplete information.
- The Perfect Bayesian Nash Equilibria for major MEV attack vectors are derived, providing precise mathematical characterizations of attacker behavior. The full proofs for the theorems are provided in Appendix A.
- It is proven that the Bertrand-style competition in the current MEV market creates a prisoner’s dilemma-like outcome, compelling rational actors to engage in aggressive extraction that harms overall system welfare.
- Novel mechanism design solutions are proposed and analyzed, and their potential to mitigate harmful MEV is quantified.
- The theoretical models are validated using on-chain data from the Ethereum blockchain, demonstrating close alignment between the predictions and observed behavior.
2. Related Work
2.1. Empirical Studies of MEV Extraction
2.2. Game-Theoretic Modeling in Blockchain
2.3. MEV Mitigation and Mechanism Design
3. Methodology: A Game-Theoretic Model of the MEV Supply Chain
3.1. Players and Strategies
- Strategy Space: A searcher ’s strategy is to submit a transaction bundle and a corresponding bid, . The bundle is a sequence of transactions, and the bid is a payment to the builder.
- Payoff: The payoff for searcher is if their bundle is included, and 0 otherwise. is the gross profit from the bundle’s execution.
- Strategy Space: A builder ’s strategy is to construct a block that maximizes their revenue.
- Payoff: The payoff for builder is , where the sum is over included searcher bundles and is the builder’s operational cost.
- Strategy Space: The designated validator’s strategy is to select the single block from all proposed blocks.
- Payoff: The validator’s payoff is , where is the block reward, includes priority fees, and is the payment from the winning builder.
3.2. Information Structure and Assumptions
- Searchers observe the public mempool state . A searcher knows their private valuation but not the valuations of other searchers.
- Builders observe all incoming bids from searchers but not their private valuations .
- Validators observe the full block proposals and associated payments but not the builders’ costs .
- Fo analytical tractability, we make the standard assumption that all players are risk-neutral profit-maximizers, while individual actors may have varying risk appetites, risk neutrality serves as a robust baseline for modeling behavior in highly competitive financial markets.
3.3. Solution Concept
4. Equilibrium Analysis
4.1. Sandwich Attack Subgame
4.2. Multi-Searcher Competition
4.3. Builder-Validator Alignment
5. Welfare Analysis
5.1. Social Welfare Loss
5.2. Distributional Effects
6. Mechanism Design Solutions
6.1. Commit-Reveal Ordering
6.2. Threshold Encryption
6.3. Operationalising Commit-Reveal on Ethereum L2s
- Commit Slot (L2 block t): A user’s wallet signs ‘commit = H(tx || nonce || salt)’. The L2 sequencer posts batched commits to an L1 data-availability layer.
- Reveal Slot (L2 block t + k): After a fixed delay of k blocks, users broadcast the clear-text transaction. The sequencer must match reveals to prior commits.
- Dispute Window: A period where anyone can submit a fraud proof if a reveal is omitted or mismatched.
6.4. Comparison with Other MEV Mitigation Strategies
7. Empirical Validation and Simulation
7.1. Empirical Data Collection and Analysis
7.1.1. Methodology
- MEV-Boost Data: We queried the proposer_payload_delivered endpoints from multiple major public relays, including Flashbots, Ultra Sound, Agnostic, and bloXroute, which collectively represent over 90% of MEV-Boost block production. This provided data on builder payments for realized MEV.
- Data Cleaning: The raw data were aggregated by block hash. Duplicate entries, which occur when multiple relays report the same winning block, were removed to create a clean dataset of unique MEV-producing blocks and their associated payments.
- DEX Volume: To estimate welfare loss, we used DeFiLlama’s public API to obtain daily trading volumes on Ethereum-based decentralized exchanges.
7.1.2. Empirical Findings
7.1.3. Sensitivity of Welfare Loss Estimates
7.2. Simulation of MEV Dynamics and Mitigation
7.2.1. Methodology
- MEV Opportunity Value (v): Set to 0.15 ETH, a representative value.
- Number of Competitors (n): Set to 9, based on our empirical validation.
- Invalidation Rate (): For the commit–reveal simulation, we used , a hypothetical arrival rate of new market information.
7.2.2. Simulation Results
8. Discussion
8.1. Interpretation of Findings
8.2. Theoretical Implications and Model Limitations
- Symmetric Searchers: We assume searchers are symmetric in skill and cost. In reality, the market is highly heterogeneous. A model with asymmetric players would likely predict a distribution of profits, with the most sophisticated searchers earning persistent rents.
- Common Knowledge of Value: Our proof for Theorem 2 assumes common knowledge of the opportunity’s value ‘v’ for simplicity. A more complex model would involve private values drawn from a common distribution. The core result—that profits diminish as ‘n’ increases—is robust to this change.
- Static Game: Our model is static, analyzing a single MEV opportunity. It does not capture the long-term evolutionary dynamics of MEV strategies or the potential for collusion.
8.3. Practical Implications
9. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
MEV | Maximal Extractable Value |
DeFi | Decentralized Finance |
AMM | Automated Market Maker |
PBNE | Perfect Bayesian Nash Equilibrium |
PBS | Proposer–Builder Separation |
FSS | Fair Sequencing Service |
Appendix A. Complete Mathematical Proofs
Appendix A.1. Proof of Theorem 1: Sandwich Attack Nash Equilibrium
Appendix A.2. Proof of Theorem 2: Multi-Searcher Competition Equilibrium
- 1.
- Eliminating Pure Strategies
- No player will bid more than v, as this guarantees a negative payoff if they win.
- No player will bid exactly v, as this guarantees a zero payoff.
- Suppose there was a symmetric equilibrium where all players bid some price . A single player could deviate by bidding (where is an arbitrarily small positive amount). This new bid would win the auction with certainty for a payoff of , which is greater than the original expected payoff of . Since a profitable deviation always exists for any bid , no pure strategy equilibrium can be sustained.
- 2.
- Bayesian Nash Equilibrium Model Setup
- 3.
- Deriving the Bidding Function
- 4.
- Application to the Common Value Case
Appendix A.3. Proof of Theorem 3: Welfare Loss from MEV
- Price Impact: When MEV extraction of size occurs, it causes a price deviation from the fair price. For small trades relative to liquidity:
- Deadweight Loss: The deadweight loss is the area of the triangle formed by the supply and demand curves (a Harberger triangle), representing the loss of consumer and producer surplus:
- Substitution: The change in quantity transacted due to the price distortion is proportional to the value of the MEV divided by the price, . Therefore,
- Aggregation: Summing over all time periods or MEV events gives the total deadweight loss:
Appendix A.4. Proof of Theorem 4: Commit-Reveal Mechanism Effectiveness
- Assumptions: We model the arrival of new market information that would invalidate a latency-sensitive MEV opportunity (e.g., a significant price change on a centralized exchange) as a Poisson process with an average arrival rate of events per block.
- MEV Validity Window: A searcher identifies an opportunity at time . They commit their transaction at , but under a commit–reveal scheme, the transaction is only revealed and executed after a delay of k blocks. The opportunity is only profitable if it remains valid throughout this entire k-block period.
- Survival Probability: The opportunity survives if, and only if, zero invalidating events occur during the k block delay.
- Poisson Probability: For a Poisson process with rate , the probability of observing exactly m events in an interval of length k is given by the probability mass function:
- Zero-Event Probability: We are interested in the probability of zero events () occurring during the delay period, which corresponds to the survival of the MEV opportunity.
- Expected Value of MEV: The expected value of the MEV opportunity under the commit–reveal scheme, , is its original value, , multiplied by the probability that it survives the delay.This demonstrates that the expected value of the MEV opportunity decays exponentially as the reveal delay k increases, making latency-based attacks progressively less profitable.
References
- Daian, P.; Goldfeder, S.; Kell, T.; Li, Y.; Zhao, X.; Bentov, I.; Breidenbach, L.; Juels, A. Flash Boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability. In Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 18–20 May 2020; pp. 910–927. [Google Scholar] [CrossRef]
- Solmaz, O.; Heimbach, L.; Vonlanthen, Y.; Wattenhofer, R. Optimistic MEV in Ethereum Layer 2s: Why Blockspace Is Always in Demand. arXiv 2025. [Google Scholar] [CrossRef]
- Qin, K.; Zhou, L.; Gervais, A. Quantifying blockchain extractable value: How dark is the forest? In Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 22–26 May 2022; pp. 198–214. [Google Scholar] [CrossRef]
- Gramlich, V.; Jelito, D.; Sedlmeir, J. Maximal extractable value: Current understanding, categorization, and open research questions. Electron. Mark. 2024, 34, 49. [Google Scholar] [CrossRef]
- Roughgarden, T.; Syrgkanis, V.; Tardos, E. The price of anarchy in auctions. J. Artif. Intell. Res. 2017, 59, 59–101. [Google Scholar] [CrossRef]
- Akbarpour, M.; Li, S. Credible Auctions: A Trilemma. Econometrica 2020, 88, 425–467. [Google Scholar] [CrossRef]
- Heimbach, L.; Kiffer, L.; Ferreira Torres, C.; Wattenhofer, R. Ethereum’s Proposer-Builder Separation: Promises and Realities. In Proceedings of the 2023 ACM on Internet Measurement Conference, Montreal, QC, Canada, 24–26 October 2023; pp. 406–420. [Google Scholar] [CrossRef]
- Barczentewicz, M. MEV on Ethereum: A Policy Analysis. ICLE White Paper, 23 January 2023. Available online: https://ssrn.com/abstract=4332703 (accessed on 14 June 2025). [CrossRef]
- Öz, B.; Rezabek, F.; Gebele, J.; Hoops, F.; Matthes, F. A Study of MEV Extraction Techniques on a First-Come-First-Served Blockchain. In Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, Avila, Spain, 8–12 April 2024; pp. 288–297. [Google Scholar] [CrossRef]
- Weintraub, B.; Torres, C.F.; Nita-Rotaru, C.; State, R. A flash(bot) in the pan: Measuring maximal extractable value in private pools. In Proceedings of the 22nd ACM Internet Measurement Conference, Nice, France, 25–27 October 2022; pp. 458–471. [Google Scholar] [CrossRef]
- Zhou, L.; Qin, K.; Torres, C.F.; Le, D.V.; Gervais, A. High-frequency trading on decentralized on-chain exchanges. In Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 24–27 May 2021; pp. 428–445. [Google Scholar] [CrossRef]
- Zhao, D. The Blockchain Game: Synthesis of Byzantine Systems and Nash Equilibria. arXiv 2019. [Google Scholar] [CrossRef]
- Reynouard, M.; Laraki, R.; Gorelkina, O. BAR Nash Equilibrium and Application to Blockchain Design. arXiv 2024. [Google Scholar] [CrossRef]
- Noguchi, M. Exact Nash-Like Solutions of Blockchain Gap Games. Preprint. 2024. Available online: https://ssrn.com/abstract=5111244 (accessed on 14 June 2025). [CrossRef]
- Commey, D.; Mai, B.; Hounsinou, S.G.; Crosby, G.V. Securing Blockchain-Based IoT Systems: A Review. IEEE Access 2024, 12, 98856–98881. [Google Scholar] [CrossRef]
- Essaidi, M.; Ferreira, M.V.X.; Weinberg, S.M. Credible, Strategyproof, Optimal, and Bounded Expected-Round Single-Item Auctions for all Distributions. In Proceedings of the 13th Innovations in Theoretical Computer Science Conference (ITCS 2022), LIPIcs, Online, 31 January–3 February 2022; Volume 215, pp. 66:1–66:19. [Google Scholar] [CrossRef]
- Choudhuri, A.R.; Garg, S.; Piet, J.; Policharla, G.V. Mempool privacy via batched threshold encryption: Attacks and defenses. In Proceedings of the 33rd USENIX Security Symposium (USENIX Security 24), Philadelphia, PA, USA, 14–16 August 2024; pp. 3513–3529. [Google Scholar]
- Yang, S.; Zhang, F.; Huang, K.; Chen, X.; Yang, Y.; Zhu, F. SoK: MEV Countermeasures: Theory and Practice. arXiv 2023. [Google Scholar] [CrossRef]
- Ferreira Torres, C.; Mamuti, A.; Weintraub, B.; Nita-Rotaru, C.; Shinde, S. Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, Salt Lake City, UT, USA, 14–18 October 2024; pp. 2591–2605. [Google Scholar] [CrossRef]
- Lee, S.; Gee, E. Commit-Reveal2: Randomized Reveal Order Mitigates Last-Revealer Attacks in Commit-Reveal. arXiv 2025. [Google Scholar] [CrossRef]
- Öz, B.; Sui, D.; Thiery, T.; Matthes, F. Who wins ethereum block building auctions and why? arXiv 2024, arXiv:2407.13931. [Google Scholar] [CrossRef]
- Fudenberg, D.; Tirole, J. Game Theory; MIT Press: Cambridge, MA, USA, 1991. [Google Scholar]
- Momeni, P.; Gorbunov, S.; Zhang, B. FairBlock: Preventing Blockchain Front-Running with Minimal Overheads. In Security and Privacy in Communication Networks; Li, F., Liang, K., Lin, Z., Katsikas, S.K., Eds.; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer Nature: Cham, Switzerland, 2023; Volume 462, pp. 250–271. [Google Scholar] [CrossRef]
- Arulprakash, M.; Jebakumar, R. Commit-reveal strategy to increase the transaction confidentiality in order to counter the issue of front running in blockchain. AIP Conf. Proc. 2022, 2460, 020016. [Google Scholar] [CrossRef]
- Churiwala, D.; Krishnamachari, B. Comma protocol: Towards complete mitigation of maximal extractable value (MEV) attacks. In Proceedings of the 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA), Kuwait, Kuwait, 24–26 October 2023; pp. 359–360. [Google Scholar] [CrossRef]
- Gorzny, J.; Kemper, P.; Derka, M. Early Observations of Based Rollups: A Case Study of Taiko. In Proceedings of the 4th International Workshop on Cryptoasset Analytics (CAAW 2025), Miyakojima, Japan, 18 April 2025; Available online: https://caaw.io/2025/papers/CAAW25_paper_21.pdf (accessed on 14 June 2025).
- Gogol, K.; Messias, J.; Miori, D.; Tessone, C.; Livshits, B. Cross-Rollup MEV: Non-Atomic Arbitrage Across L2 Blockchains. arXiv 2024. [Google Scholar] [CrossRef]
- Öz, B.; Torres, C.F.; Gebele, J.; Rezabek, F.; Mazorra, B.; Matthes, F. Pandora’s Box: Cross-Chain Arbitrages in the Realm of Blockchain Interoperability. arXiv 2025. [Google Scholar] [CrossRef]
- Duan, L.; Sun, Y.; Ni, W.; Ding, W.; Liu, J.; Wang, W. Attacks against cross-chain systems and defense approaches: A contemporary survey. IEEE/CAA J. Autom. Sin. 2023, 10, 1647–1667. [Google Scholar] [CrossRef]
- Lorünser, T.; Wohner, F.; Krenn, S. A privacy-preserving auction platform with public verifiability for smart manufacturing. In Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP 2022), Online, 9–11 February 2022; Mori, P., Lenzini, G., Furnell, S., Eds.; SciTePress: Setúbal, Portugal, 2022; pp. 637–647. [Google Scholar] [CrossRef]
Assumed Slippage Rate | Estimated Cumulative Welfare Loss |
---|---|
0.10% (Highly Conservative) | USD228 Million |
0.20% (Baseline) | USD456 Million |
0.35% (Moderate) | USD798 Million |
0.50% (Aggressive) | USD1.14 Billion |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Appiah, B.; Commey, D.; Bagyl-Bac, W.; Adjei, L.; Owusu, E. Game-Theoretic Analysis of MEV Attacks and Mitigation Strategies in Decentralized Finance. Analytics 2025, 4, 23. https://doi.org/10.3390/analytics4030023
Appiah B, Commey D, Bagyl-Bac W, Adjei L, Owusu E. Game-Theoretic Analysis of MEV Attacks and Mitigation Strategies in Decentralized Finance. Analytics. 2025; 4(3):23. https://doi.org/10.3390/analytics4030023
Chicago/Turabian StyleAppiah, Benjamin, Daniel Commey, Winful Bagyl-Bac, Laurene Adjei, and Ebenezer Owusu. 2025. "Game-Theoretic Analysis of MEV Attacks and Mitigation Strategies in Decentralized Finance" Analytics 4, no. 3: 23. https://doi.org/10.3390/analytics4030023
APA StyleAppiah, B., Commey, D., Bagyl-Bac, W., Adjei, L., & Owusu, E. (2025). Game-Theoretic Analysis of MEV Attacks and Mitigation Strategies in Decentralized Finance. Analytics, 4(3), 23. https://doi.org/10.3390/analytics4030023